AutoPOI: Automated Points Of Interest Selection for Side-channel Analysis

[1]  Stjepan Picek,et al.  Exploring Feature Selection Scenarios for Deep Learning-based Side-Channel Analysis , 2022, IACR Cryptol. ePrint Arch..

[2]  Shengyi Huang,et al.  A Closer Look at Invalid Action Masking in Policy Gradient Algorithms , 2020, FLAIRS.

[3]  Paul Ampadu,et al.  SCARL: Side-Channel Analysis with Reinforcement Learning on the Ascon Authenticated Cipher , 2020, ArXiv.

[4]  E. Prouff,et al.  Deep learning for side-channel analysis and introduction to ASCAD database , 2019, Journal of Cryptographic Engineering.

[5]  Lejla Batina,et al.  A Systematic Evaluation of Profiling Through Focused Feature Selection , 2019, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[6]  Debdeep Mukhopadhyay,et al.  CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis , 2019, IEEE Transactions on Computers.

[7]  Annelie Heuser,et al.  The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations , 2018, IACR Cryptol. ePrint Arch..

[8]  Alec Radford,et al.  Proximal Policy Optimization Algorithms , 2017, ArXiv.

[9]  Emmanuel Prouff,et al.  Breaking Cryptographic Implementations Using Deep Learning Techniques , 2016, SPACE.

[10]  Máire O'Neill,et al.  Neural network based attack on a masked implementation of AES , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[11]  Romain Poussier,et al.  Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis) , 2015, COSADE.

[12]  Shane Legg,et al.  Human-level control through deep reinforcement learning , 2015, Nature.

[13]  Michael I. Jordan,et al.  Trust Region Policy Optimization , 2015, ICML.

[14]  Markus G. Kuhn,et al.  Efficient Template Attacks , 2013, CARDIS.

[15]  Joos Vandewalle,et al.  Machine learning in side-channel analysis: a first study , 2011, Journal of Cryptographic Engineering.

[16]  Moti Yung,et al.  A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..

[17]  Emmanuel Prouff,et al.  A Generic Method for Secure SBox Implementation , 2007, WISA.

[18]  Stefan Mangard,et al.  Power analysis attacks - revealing the secrets of smart cards , 2007 .

[19]  Christof Paar,et al.  Templates vs. Stochastic Methods , 2006, CHES.

[20]  Eric Peeters,et al.  Template Attacks in Principal Subspaces , 2006, CHES.

[21]  Christof Paar,et al.  A Stochastic Model for Differential Side Channel Cryptanalysis , 2005, CHES.

[22]  Pankaj Rohatgi,et al.  Template Attacks , 2002, CHES.

[23]  Yishay Mansour,et al.  Policy Gradient Methods for Reinforcement Learning with Function Approximation , 1999, NIPS.

[24]  Huaiyu Zhu On Information and Sufficiency , 1997 .

[25]  Ronald J. Williams,et al.  Simple Statistical Gradient-Following Algorithms for Connectionist Reinforcement Learning , 2004, Machine Learning.

[26]  R. Fisher THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .

[27]  Stjepan Picek,et al.  Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis , 2021, IACR Cryptol. ePrint Arch..

[28]  Stjepan Picek,et al.  The Best of Two Worlds: Deep Learning-assisted Template Attack , 2021, IACR Cryptol. ePrint Arch..

[29]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[30]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[31]  Christian R. Shelton,et al.  Importance sampling for reinforcement learning with multiple objectives , 2001 .

[32]  Long-Ji Lin,et al.  Reinforcement learning for robots using neural networks , 1992 .

[33]  H. Hotelling Analysis of a complex of statistical variables into principal components. , 1933 .